Design of Cognitive Radio Systems Under ... - Semantic Scholar

1 downloads 152 Views 1MB Size Report
IN recent years, increasing demand of wireless services has ... The system design consists ... the power spectral density (PSD) at every secondary transmitter.
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 58, NO. 6, JUNE 2010

3251

Design of Cognitive Radio Systems Under Temperature-Interference Constraints: A Variational Inequality Approach Jong-Shi Pang, Gesualdo Scutari, Member, IEEE, Daniel P. Palomar, Senior Member, IEEE, and Francisco Facchinei

Abstract—The concept of cognitive radio (CR) has recently received great attention from the research community as a promising paradigm to achieve efficient use of the frequency resource by allowing the coexistence of licensed (primary) and unlicensed (secondary) users in the same bandwidth. In this paper, we propose a novel Nash equilibrium (NE) problem to model concurrent communications of cognitive secondary users who compete against each other to maximize their information rate. The formulation contains constraints on the transmit power (and possibly spectral masks) as well as aggregate interference tolerable at the primary users’ receivers. The coupling among the strategies of the players due to the interference constraints presents a new challenge for the analysis of this class of Nash games that cannot be addressed using the game theoretical models proposed in the literature. For this purpose, we need the framework given by the more advanced theory of finite-dimensional variational inequalities (VI). This provides us with all the mathematical tools necessary to analyze the proposed NE problem (e.g., existence and uniqueness of the solution) and to devise alternative distributed algorithms along with their convergence properties. Index Terms—Cognitive radio, distributed algorithms, game theory, Gaussian interference channel, Nash equilibrium, pricing games, temperature-interference constraints, variational inequality theory.

I. INTRODUCTION AND MOTIVATION N recent years, increasing demand of wireless services has made the radio spectrum a very scarce and precious resource. Moreover, most current wireless networks characterized

I

Manuscript received June 19, 2009; accepted January 07, 2010. Date of publication February 17, 2010; date of current version May 14, 2010. The associate editor coordinating the review of this manuscript and approving it for publication was Prof. Erik G. Larsson. The work of J.-S. Pang is based on research supported by the U.S.A. National Science Foundation grants DMS 0754374 and CMI 0802022 and by the Air Force Office of Sponsored Research. The work of G. Scutari and D. P. Palomar was supported by the NSFC/RGC N_HKUST604/08 research grant. The work of F. Facchinei was supported by the Italian project MIUR-PRIN 20079PLLN7 Nonlinear Optimization, Variational Inequalities and Equilibrium Problems. Part of this material was presented at the 35th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Dallas, TX, March 14–19, 2010. J.-S. Pang and G. Scutari are with the Department of Industrial and Enterprise Systems Engineering, University of Illinois at Urbana-Champaign, Urbana, IL 61801 USA (e-mail: [email protected]; [email protected]). D. P. Palomar is with the Department of Electronic and Computer Engineering, Hong Kong University of Science and Technology, Hong Kong (e-mail: [email protected]). F. Facchinei is with the Department of Computer and System Sciences Antonio Ruberti, University of Rome “La Sapienza,” Rome, Italy (e-mail: [email protected]). Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org. Digital Object Identifier 10.1109/TSP.2010.2043138

by fixed spectrum assignment policies are known to be very inefficient considering that licensed bandwidth demands are highly varying along the time and/or space dimensions. Indeed, according to the Federal Communications Commission (FCC), only 15% to 85% of the licensed spectrum is utilized on average [1]. Cognitive Radio (CR) originated as a possible solution to this problem [2] obtained by endowing the radio nodes with “cognitive capabilities,” e.g., the ability to sense the electromagnetic environment, make short term predictions, and react consequently by adapting transmission parameters (e.g., operating spectrum, modulation, and transmission power) in order to optimize the usage of the available resources [3]–[5]. The widely accepted debated position proposed for implementing the spectrum sharing idea of CR calls for a hierarchical access structure, distinguishing between primary users, or legacy spectrum holders, and secondary users, who access the licensed spectrum dynamically, under the constraint of not inducing intolerable Quality of Service (QoS) degradations on the primary users [3]–[5]. To deal with such constraints, both deterministic and probabilistic interference constraints have been suggested in the literature (see, e.g., [3] and [4]). In this paper, we focus on deterministic interference constraints and consider a generalization of the original interference temperature-limit concept introduced by the FCC Spectrum Policy Task Force [1]: The primary users, according to their own QoS requirements, impose a threshold on the maximum level of per-carrier and total (i.e., over the whole bandwidth) aggregate interference generated by the secondary users. The system design consists then in finding the most appropriate transmission strategy (according to some prescribed optimality criterion) for the competing cognitive users that share a given portion of spectrum with the primary users, under local transmit power and interference constraints. One approach to devise such a system design would be using global optimization techniques, under the framework of network utility maximization (NUM) (see, e.g., [6] and [7]). Recent results in [8] have shown that the NUM problem based on the maximization of the information rates over frequency-selective SISO interference channels is an NP-hard problem, under different choices of the system utility function. Several attempts have been pursued in the literature to deal with the nonconvexity of such a problem. Some works proposed suboptimal or close-to-optimal algorithms based on duality theory [9]–[11] or Nash bargaining optimality criterion (see [12] and references therein) to compute, under technical conditions and/or simplifying assumptions on the users’ transmission strategies (e.g.,

1053-587X/$26.00 © 2010 IEEE Authorized licensed use limited to: University of Illinois. Downloaded on May 18,2010 at 22:04:08 UTC from IEEE Xplore. Restrictions apply.

3252

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 58, NO. 6, JUNE 2010

TDM/FDM strategies), the largest achievable rate region of the system. But these works lack any mechanism to control the amount of aggregate interference generated by the transmitters; which makes them not applicable to CR systems. On the other hand, in [13]–[15], the authors explicitly took into account the temperature-interference constraint (in terms of the total aggregate interference only), but under some simplifying ad hoc assumptions—high or low SINR regime [14], flat-fading CDMA interference channels [13] or multiple-access channels [15]—reducing the original nonconvex spectrum management problem to a simpler (scalar) power control convex problem [15] or a Geometric Programming [7], [13], [14]. On top of that, the algorithms proposed in most of the above papers [8]–[11], [13], [15] are centralized and computationally expensive. This raises some practical issues that are insurmountable in the CR context. For example, these algorithms need a central node having full knowledge of all the channels and interference structure at every receiver; which poses serious implementation problems in terms of scalability and amount of signaling to be exchanged among the nodes. Thus, it seems natural to concentrate on decentralized strategies, where the cognitive users are able to self-enforce the negotiated agreements on the usage of the available spectrum without the intervention of a centralized authority. The philosophy underlying this approach is a competitive optimality criterion, as every user aims for the transmission strategy that unilaterally maximizes his own payoff function. This form of equilibrium is, in fact, the well-known concept of Nash equilibrium (NE) in game theory (see, e.g., [16]). Because of the inherently competitive nature of the interference channel, it is not surprising indeed that game theory has been already adopted to solve distributively many power control problems over either flat-fading or frequency-selective (in practice, multicarrier) Gaussian interference channels. An early application of game theory in the latter context is [17], where the information rates of the users were maximized with respect to the power allocation (under transmit power constraints) in a two-user DSL system. Extensions of the basic problem to ad hoc frequency-selective networks, including possibly spectral mask constraints, were given in [18]–[25]. The state-of-the-art algorithm is the asynchronous iterative waterfilling algorithm (IWFA) [24]. Results in the cited papers however have been recognized not to be applicable to CR systems because they do not provide any decentralized mechanism to control the amount of aggregate interference generated by the secondary users at the primary receivers. Observe that the use of the spectral masks in the IWFAs in [18], [21], [23], and [24] does not provide a satisfactory solution to this problem, since spectral masks limit the power spectral density (PSD) at every secondary transmitter rather than the aggregate interference at the primary receivers. This is either too conservative (it can severely constrain the data rate of the secondary links, especially when there are no primary systems close to the secondary users) or does not result in the required interference temperature-limit constraints when the number of interfering systems grows (recall that, in [18], [21], [23], and [24], the spectral masks are fixed and chosen a priori). In this paper, we fill this gap using a new framework based on VI. We propose a novel NE problem where the secondary users compete with each other to maximize the information rate

on their own link, given local constraints on the transmit power and (possibly) spectral mask, and global constraints on the maximum per-carrier and total aggregate interference tolerable by the primary receivers. A natural way to control the aggregate interference generated by the secondary users while keeping the optimization as decentralized as possible is via pricing through a penalty term. However, the introduction of such coupling constraints among the strategies of the players presents a new challenge for the analysis of the proposed Nash game. None of the current results in the literature provide a satisfactory answer to the study of the proposed game, neither the game theoretical models proposed for the interference channel in [18]–[25] nor the equilibrium models based on pricing [26]–[31] (see Section II for a detailed comparison between our NE problem and current game theoretical models using pricing techniques). For this purpose, we need the framework provided by the more advanced theory of finite-dimensional VIs [32]. Building on this framework, we prove that the proposed NE problem always admits a solution and derive sufficient conditions guaranteeing the uniqueness of this equilibrium. We then focus on distributed algorithms that converge to a solution of the NE problem and on their convergence properties. We propose alternative algorithms that differ in performance, level of protection of the primary users, computational effort and signaling among primary and secondary users, convergence analysis, and convergence speed, which makes them suitable for many different CR systems. Furthermore, at the price of some signaling from the primary to the secondary users, albeit very reduced, all these algorithms outperform (in terms of achievable sum-rate) conservative IWFAs using spectral masks [20], [21], [23], [24] and overcome the main drawback of classical IWFAs [17], [33], i.e., the violation of the interference temperature-limit. On top of that, the second major contribution of the paper is to introduce a new line of analysis based on VIs in the literature of distributed power allocation games (possibly based on pricing) that is expected to be broadly applicable for other game models. The paper is organized as follows. Section II introduces the system model and formulates the NE problem. Section III provides a detailed analysis of the NE problem with exogenous prices, i.e., the game where the prices are fixed and chosen a priori. Results obtained in such a case are instrumental to study the original NE problem with exogenous prices, as detailed in Section IV. Section V provides some numerical results comparing the proposed algorithms. Finally, Section VI draws some conclusions. In order to make the paper accessible to readers who are not familiar with VIs, in Appendix A, we review some basic concepts and results of finite-dimensional variational inequalities and complementarity problems that will be used through the paper. A comprehensive treatment of these problems can be found in the two monographs [32], [34]. II. SYSTEM MODEL AND PROBLEM FORMULATION We consider a scenario composed of primary users and secondary users, each formed by a single transmitter-receiver pair, coexisting in the same area and sharing the same band (see Fig. 1). We focus on block transmissions over SISO frequency-selective channels. It is well known that, in such a case, multicarrier transmission is capacity achieving for large block-

Authorized licensed use limited to: University of Illinois. Downloaded on May 18,2010 at 22:04:08 UTC from IEEE Xplore. Restrictions apply.

PANG et al.: CR SYSTEMS UNDER TEMPERATURE-INTERFERENCE CONSTRAINTS

3253

Fig. 1. System model of a hierarchical CR system with primary users (uplink cellular system in blue) and secondary users (red pairs).

length [35]. The systems coexisting in the network do not cooperate with each other, and no centralized authority is assumed to handle the network access for the secondary users. Hence, it is natural to model the set of cognitive secondary users as a freis quency-selective -parallel interference channel, where the number of available subcarriers. The transmission strategy of each secondary user is then the power allocation vector over the subcarriers, subject to the following (local) transmit power constraints: (1) where we also included local spectral mask constraints [the vector inequality in (1) is component-wise] that may be imposed by radio regulatory bodies to limit the maximum power spectral density (PSD) that each transmitter can use over a specified band. To avoid a trivial solution, we assume and throughout the paper that, for all

(2) otherwise, either the upper bound constraints or the total power constraint are redundant. Due to the distributed nature of the CR systems, with neither a centralized control nor coordination among the secondary users, we focus on transmission techniques where no interference cancellation is performed and the MUI is treated as additive colored noise at each receiver. We also assume that the chan-

nels change sufficiently slowly to be considered fixed during the whole transmission, so that the information theoretical results are meaningful, and that perfect channel state information (CSI) is available at both transmitter and receiver sides of each secondary link. This CSI includes, for each secondary pair , the channel transfer function of the direct link from the other sec(but not the cross-channels ondary users) as well as the overall PSD of the noise plus MUI at , where each subcarrier, given by includes both the thermal noise power (zero-mean circularly symmetric complex Gaussian noise) and the MUI PSD due to the active primary users. To implement some of the proposed algorithms, additional CSI is needed from the secondary users; a discussion on this issue is given in Section IV-C, where practical implementation issues of the algorithms are addressed. Under the setup above, invoking the capacity expression for the single user Gaussian channel—achievable using random Gaussian codes by all the users—the maximum information rate on link for a specific power allocation profile is [35]1

(3) where is the set of all the users power allocation vectors, except the th one. Temperature-Interference Constraints: Differently from traditional static or centralized spectrum assignment, opportunistic communications in CR systems enable secondary users 1Observe that a NE is obtained if each user transmits using Gaussian signaling, with a proper power allocation. However, Nash equilibria achievable using non-Gaussian codes may exist. In this paper, we focus only on transmissions using Gaussian codebooks.

Authorized licensed use limited to: University of Illinois. Downloaded on May 18,2010 at 22:04:08 UTC from IEEE Xplore. Restrictions apply.

3254

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 58, NO. 6, JUNE 2010

to transmit with overlapping spectrum and/or coverage with primary users, provided that the degradation induced on the primary users’ performance is null or tolerable [3], [4]. In this paper, we consider the following (deterministic) interference constraints that impose an upper bound on the per-carrier and total aggregate interference (the interference temperature-limit [1], [3]) that can be tolerated by each primary user

(4)

where is the channel transfer function between the transmitter of the th secondary user and the receiver of the th primary user, and and are the interference temperature limit and the maximum interference over subcarrier tolerable by the th primary user, respectively. These limits are chosen by each primary user, according to his QoS requirements (see, e.g., [3]). Problem Formulation: Within the CR context above, we formulate the optimization problem of the transmission strategies of the secondary users as a Nash equilibrium problem (NEP): Each secondary user aims at maximizing his own rate under the local power constraints in (1) and the interference constraints in (4). The interference constraints however introduce a coupling among the admissible power allocations of all the players, meaning that the secondary users are not allowed to choose their power allocations individually. To keep the optimization as decentralized as possible while imposing global interference constraints, the proposed idea is to introduce a pricing mechanism, properly controlled by the primary users, through a penalty in the payoff function of each player, so that the interference generated by all the secondary will depend on these prices. Stated in mathematical terms, we have the following NEP: maximize

subject to

(7)

for all , where is defined in (1), is defined in (3), and the prices and are chosen such that the following complementary conditions are satisfied:

(8)

means , In (8), the compact notation , and . These constraints state that the per-carrier/total interference constraints must be satisfied together with nonnegative pricing; in addition, they imply that if one constraint is trivially satisfied with strict inequality then the corresponding price should be zero (no punishment is needed in that case). With a slight abuse of terminology, we will refer in the following to the NEP (7) with the complementarity constraints (8) as game . The challenging goal is then to find the proper decentralized pricing mechanism guaranteeing that the interference constraints [the complementarity conditions (8)] are satisfied while the secondary users reach an equilibrium. Remark 1 (Pricing Techniques and Related Works): Pricing in game theory is not a new idea. Various auction and pricing approaches have been proposed in the literature to solve spectrum allocation problems in wireline systems (e.g., [20] and [36]), wireless multiple access (see, e.g., [37] and references therein) and ad hoc networks (e.g., [26], [27] and [28]–[31]). The current literature can be divided in two large classes, according to the meaning given to the prices: 1) Works where pricing techniques are introduced as heuristics to incentivize the players to reach more socially efficient Nash equilibria [20], [26], [27], [36], [37]; and 2) works dealing with (competitive/cooperative) economy equilibrium models, where prices are used to quantify in monetary terms the value (or worth) of some goods/service involved in the trading between sellers and buyers [28]–[31] (see [31] for a recent overview of the state-of-the-art results in this context). Moreover, most of the algorithms proposed in the cited papers are centralized, and thus they are not applicable to distributed CR networks. In our formulation instead, prices are used to impose coupling constraints (the interference constraints) to the users in a distributed fashion. In the next section, we will see indeed that the prices introduced in the payoff function of the players in (7) are just the multipliers associated to the coupling constraints (4) of the VI reformulation of the game . As far as the analysis of the proposed game is concerned, the coupling among the strategies of the players due to the global interference constraints presents a new challenge for the analysis of this class of Nash games that cannot be addressed using game theoretical models for the interference channel in [20]–[24], [33] or market-equilibrium based models [28]–[31]. For this purpose, we need the framework given by the more advanced theory of finite-dimensional VIs [32] that provides a satisfactory resolution to the game , as detailed in the forthcoming sections. III. GAME WITH EXOGENOUS PRICES Before analyzing the game in (7), (8), we start studying a related game, interesting in its own, where the prices are fixed and chosen a priori. This assumption may be motivated by all the CR scenarios where a signaling among the primary and secondary users is not allowed (e.g., the so-called common model paradigm [4], [5]) and prices are chosen by the network service provider. Some heuristics in the choice of the prices have been proposed, e.g., in [20] and [36] for DSL systems (see also references therein). The results obtained studying the game with exogenous prices provide the building blocks instrumental to analyze the more involved game with endogenous prices.

Authorized licensed use limited to: University of Illinois. Downloaded on May 18,2010 at 22:04:08 UTC from IEEE Xplore. Restrictions apply.

PANG et al.: CR SYSTEMS UNDER TEMPERATURE-INTERFERENCE CONSTRAINTS

Given the tuple , let player , defined as

, with each denote the payoff function of

3255

and the vector function is defined as where each

, (14)

(9) (15) with sider

the

following

given in (3). We then conNEP (game in strategic form) :

with

denoting the gradient (column) vector of with respect to , and

(10)

where is the set of players; is the strategy is the payoff set of player , defined in (1); and function of player , defined in (9). Note that game in (7) reduces to game if with fixed prices the vector in (10) is chosen as (11) for and . have been studied in [9], Games with pricing related to [26], [27], [38]. However, only numerical results are available to support the uniqueness of the NE and the convergence of the IWFAs with pricing [26]. Furthermore, none of the theoretical results proposed in the literature to solve scalar and vector power control games, such as the approaches based on the theory of standard functions [38]–[40] or the reformulation of the Nash game (with no prices) as a Linearly Complementary Problem [21] (or, equivalently, the interpretation of the waterfilling solution as a projection [18], [23], [24]) are useful for the analysis of game . In this section, we fill this gap and provide a detailed analysis of , valid for arbitrary but fixed tuple [not necessarily in the form (11)]. Our approach provides a new line of analysis of vector power control games with prices that is expected to be broadly applicable to other game models. To study game , we provide first some intermediate definitions and results. A. Intermediate Definitions and Results (and ) as a VI problem, we In order to rewrite the game introduce the joint admissible strategy set , defined as shown in (12) at the bottom of the page, with (13)

(16) In what follows, we provide sufficient conditions for the vector function to be either a strongly monotone function [32, Def. 2.3.1(e)] or a uniformly P-function on (and ) [32, Def. 3.5. 8(b)]. This result will be instrumental to obtain conditions guar(and the uniqueanteeing the uniqueness of the NE of game ness of the NE power allocation of game ) as well as the global convergence of the proposed iterative algorithms. Definition 1: The mapping in (14) is said to be (a) strongly monotone on (or ) if there exists a constant such that for all pairs and in

(or

), (17)

is called the strong monotonicity constant. The constant (b) a uniformly P-function on (or ) if there exists a constant such that for all pairs and in

(or

),

(18) We also need the definition of Z-matrix [34, Def. 3.3.1] and P-matrix [34, Def. 3.11.1], as given next. is called Z-matrix if its Definition 2: A matrix off-diagonal entries are all nonpositive. A matrix is called P-matrix if every principal minor of is positive. A Z-matrix that is also P-matrix is called a K-matrix. Many equivalent characterizations for a P-matrix can be given. The interested reader is referred to [34], [41] for more details. Here we note that any positive definite matrix is a P-matrix, but the reverse does not hold, and we recall a characterizing property of a K-matrix relevant to our forthcoming derivations, as given in the following lemma (proved in [34, Lemma 5.13.14]).

(12)

Authorized licensed use limited to: University of Illinois. Downloaded on May 18,2010 at 22:04:08 UTC from IEEE Xplore. Restrictions apply.

3256

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 58, NO. 6, JUNE 2010

Lemma 1: Let be a K-matrix, a denote the spectral radius of nonnegative matrix, and let .2 Then if and only if is a K-matrix. Finally, we introduce the Z-matrices , useful to study the monotonicity properties of the mapping and the uniqueness of the NE of the proposed games:

prices is studied. The constant in (24) has important roles in studying the convergence of the distributed algorithms proposed in the forthcoming sections. in a convenient form, we Finally, to write the solutions of , the waterfilling-like mapping introduce, for each and , defined as: for

if if

(19)

,

(25)

if (20)

if with

(21)

where with and is chosen to satisfy the power constraint ( if the inequality is strictly satisfied). Practical algocan be found in [43]. rithms to compute the water-level B. Nash Equilibria of Game

and if if (22) with (23)

We can now study the game in (10) and obtain sufficient conditions guaranteeing the uniqueness of the NE, as given next (basic concepts and results on VIs used extensively through the paper are given in Appendix A). Theorem 3 (Existence and Uniqueness of the Nash Equi, consider the game in (10) and suppose libria): Given w.l.o.g. that conditions in (2) are satisfied. Then, the following hold: , which al(a) The game is equivalent to the ways admits a solution, for any given set of channel matrices, . Every NE solution power constraints of the users, and satisfies the following vector waterfilling-like fixed-point equation:

(componentwise). The next proposition proNote that vides sufficient conditions for the map to be a strongly monotone or a uniformly P-function on the set (and ). Proposition 2: Given , , , and , defined in (12), (13), (14), and (20), respectively, the following hold: (a) If is a P-matrix, then is a uniformly P-function on (and thus also on ); (b) If (positive definite), then is a strongly monotone function on (and thus also on ). Proof: See Appendix B. It follows readily from the proof of the proposition that a lower bound of the strong monotonicity constant of on is [see (60) in Appendix B)]

defined in (25). with (b) If is a P-matrix (which is the case if is a positive definite is unique. matrix), then the NE of Proof: (a): By the convexity and the first-order (necessary and sufficient) optimality conditions of each of the optimization is a NE of game if and problems in (10), we know that only if for each

(24)

(27)

denoting the smallest eigenvalue with of the symmetric part of , and . A lower bound of the uniformly P-constant of can be similarly obtained, based on [34, Ex. 5.11.19]. The P-property of matrix will be used in Section III-B to prove the uniqueness of the NE of the game as well as the convergence of the proposed distributed will algorithms; whereas the positive definite property of be exploited in Section IV where the game with endogenous

The set of inequalities above is equivalent to the (cf. Appendix A). The existence of a NE of —a solution to —follows from [32, Corollary 2.2.5]: the set is compact and convex and the function is continuous. The waterfilling-like structure of the Nash equilibria as given in (26) follows directly from the fact that, for every and fixed , the waterfilling function in (25) is the unique solution to the th (strictly convex) optimization problem in (10). (b): If is a P-matrix, then it follows from Proposition 2(a) ) is a uniformly P-functhat the function (and thus also tion on , which, together with the Cartesian structure of (i.e.,

2The

spectral radius of a square matrix A is defined as (A) = maxfjj : A)g, with (A) denoting the set of eigenvalues of A [42].

 2 (

(26)

Authorized licensed use limited to: University of Illinois. Downloaded on May 18,2010 at 22:04:08 UTC from IEEE Xplore. Restrictions apply.

PANG et al.: CR SYSTEMS UNDER TEMPERATURE-INTERFERENCE CONSTRAINTS

), guarantees the uniqueness of the NE [32, Prop. 3.5.10(a)] (cf. Appendix A). To give additional insight into the physical interpretation of we provide next sufthe uniqueness conditions of the NE of ficient conditions for the matrix to be a P-matrix (or positive and definite matrix). It follows from Lemma 1 (with ) that (a Z-matrix) is a P-matrix (and thus a K-ma, which leads to the following. trix) if and only if Corollary 4: The matrix is a P-matrix (or a positive definite matrix) if one (or both) of the following two sets of conditions are satisfied: Low received MUI:

(C1)

3257

problem (10), performing the single-user water-filling solution the power allocation vector of user in (25). Denoting by at the th iteration, the sequential IWFA with pricing is formally described in Algorithm 1 (the simultaneous IWFA follows similarly). A unified set of convergence conditions for both sequential and simultaneous versions of the algorithm is given in Theorem 6. Algorithm 1: Sequential IWFA with pricing for all , and set Data: Choose any . Step 1 : If satisfies a suitable termination criterion: STOP , compute Step 2 : Sequentially for as

Low generated MUI: (28) Step 3 : Set (C2) is some positive vector. where One can also obtain milder conditions for the uniqueness of following the approach proposed in [22]. the NE of game The main result is stated next (the proof follows similar steps as in [22, Th. 2] and is omitted, because of the space limitation). defined in (19) is a P-matrix Corollary 5: If each matrix , for all ], then [or equivalently the NE of is unique. Remark 2 (Physical Interpretation of the Uniqueness Conditions): Conditions (C1) and (C2) provide a physical interpretation of the uniqueness of the NE: the uniqueness of the NE is ensured for any given if the interference among the links is sufficiently small and, interestingly, is not affected by the values of the prices . The importance of the above conditions is that they quantify how small the interference must be to guarantee that the equilibrium is indeed unique. Specifically, conditions (C1) can be interpreted as a constraint on the maximum amount of interference that each receiver can tolerate, whereas (C2) introduce an upper bound on the maximum level of interference that each transmitter is allowed to generate. We show next that the uniqueness conditions in Theorem 3 are also sufficient for the convergence of the proposed distributed iterative algorithms, based on the waterfilling best-response (25). C. Distributed Algorithms We focus now on distributed algorithms that converge to the NE of game . We consider iterative algorithms based on both sequential and simultaneous updates of the power allocation vectors of the users according to the waterfilling-like best-response in (25), and prove their global convergence under the same conditions guaranteeing the uniqueness of the NE of game . Interestingly, the proposed algorithms can also be implemented in a totally asynchronous way. Synchronous Implementation: The sequential (or the simultaneous) iterative algorithm we propose is an instance of the Gauss-Seidel (or Jacobi) scheme: Each player, sequentially (or simultaneously) and according to a fixed updating order, solves

; and go to Step 1.

Theorem 6: Suppose that defined in (20) is a P-matrix. Then, any sequence generated by the sequential IWFA (or the simultaneous IWFA) described in Algorithm 1 converges to the unique NE of game , for any given updating . order of the users and Proof: See Appendix C. The proposed algorithms have some desirable properties that make them appealing in many practical ad hoc systems, namely: low complexity, distributed nature, and fast convergence be(recall that in the havior. In fact, given the pricing vector the pricing vector is assumed to be fixed), the opgame timal power allocations of each user can be efficiently and locally computed using a waterfilling based solution; which requires only the local measure of the overall interference-plusnoise power spectral density. Moreover, the simultaneous version of the algorithm has been experimented to converges in very few iterations, even in networks with many active secondary users (see Section V for some numerical results) and imposes less stringent constraints on the synchronization among the secondary user than the sequential version. Observe that the convergence of the algorithms is guaranteed under the same conditions obtained for the uniqueness of the solution of the game (cf. Theorem 3). As expected, the convergence is ensured if the level of interference in the network is not too high (see Remark 2). Asynchronous Implementation: In a real CR network with many secondary users, the synchronization requirement from both sequential and simultaneous IWFAs might not always be acceptable. It is thus natural to ask whether some asynchronous implementation of the proposed algorithm is still guaranteed , under some sufficient to globally converge to the NE of conditions. More specifically, we consider totally asynchronous schemes (in the sense specified in [44]), where some secondary users may update their power allocations more frequently than others and they may even use an outdated measurement of the interference caused from the others. The only constraints on the updating schedule performed by the secondary users are that

Authorized licensed use limited to: University of Illinois. Downloaded on May 18,2010 at 22:04:08 UTC from IEEE Xplore. Restrictions apply.

3258

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 58, NO. 6, JUNE 2010

each user updates his power allocation at least once within any sufficiently large, but finite, time interval and that outdated measurements of the interference are eventually replaced by more recent ones. We say that an updating schedule of the users is feasible if the conditions above are satisfied (see [24] for a formal description of the asynchronous algorithm in a different context). Convergence conditions are given in the following theorem (the proof is omitted because of the space limitation; see [24] for a similar approach). Theorem 7: Suppose that defined in (22) is a P-magenerated by the trix. Then, any sequence totally asynchronous IWFA [44] and based on the mapping defined in (25) converges to , for any given feasible updating the unique NE of game schedule of the users and . Note that the asynchronous IWFA contains as special cases a plethora of algorithms, each one obtained by a possible choice of the scheduling of the users in the updating procedure. The sequential IWFA given in Algorithm 1 and the simultaneous IWFA are indeed two special cases. The important result stated in Theorem 7 is that all the algorithms resulting as special cases of the asynchronous IWFA are guaranteed to reach the unique NE of the game, under the same set of convergence conditions, since the entries of matrix do not depend on the particular choice of the updating schedule. This also means that this class of algorithms is robust against missing or outdated updates of the secondary users; which strongly relaxes the constraints on the network synchronization. The algorithms proposed so far may suffer of the main drawback of classical IWFA (e.g., [17]), i.e., the violation of the interference temperature limits [3], if the pricing vector is not properly chosen. The goal of the next section is indeed to show how to design the prices in order to preserve the QoS of the primary users, keeping the proposed algorithms as decentralized as possible.

which measures the violation of the temperature-interference constraints. We also introduce the nonnegative matrix , defined as (30) with and , for and . To study game , we need the following technical property of . Proposition 8: Suppose . Then the map in (29) is with modulus , a co-coercive function of i.e.

(31) with

(32) denotes the spectral norm of defined in (30), and is defined in (24). Proof: See Appendix D. Note that the co-coercivity of implies that is Lipschitz , i.e. continuous with modulus where

(33) for all now on game

. Using the above results, we focus in (7), (8).

IV. GAME WITH ENDOGENOUS PRICES We focus now on game defined in (7) and, using results obtained for game in (10), we provide sufficient conditions guaranteeing the uniqueness of the solution of and propose a variety of iterative algorithms along with their convergence properties. To this end, we introduce the following preliminary definitions and results. Under the P-property of matrix , we have proved in Theof game is unique, for any given orem 3(b) that the NE . Under this condition, let us choose satisfying (11) and define the map

A. Equilibrium Solutions The main properties of the solutions of the game are given in the following, where , , , and are defined in (12), (14), denotes the unique (20), and (29), respectively, and NE of (under the P-property of ), with given in (11). Theorem 9: Consider the game and suppose w.l.o.g. that conditions (2) are satisfied. Then, the following hold: , which always (a) The game is equivalent to the admits a solution, denoted by . The equivalence is in the is a solution of the VI, then there exists following sense: if —the multipliers of the VI associated with the interference is an equilibrium pair of constraints (4)—such that ; conversely, if is an equilibrium pair of , then is a solution of the VI, and are multipliers of the VI; (b) If is a P-matrix, then the game is equivalent to the nonlinear complementarity problem in the price tuple

(29) Authorized licensed use limited to: University of Illinois. Downloaded on May 18,2010 at 22:04:08 UTC from IEEE Xplore. Restrictions apply.

(34)

PANG et al.: CR SYSTEMS UNDER TEMPERATURE-INTERFERENCE CONSTRAINTS

The equivalence is in the following sense: the must have a solution and, for any such solution , the pair is an equilibrium of ; conversely, if is an equilibrium pair of , then is a solution with ; of the (c) If is positive definite, then of the is unique, and it must be (c1) The solution , for any solution of the ; (c2) The game has a unique least-norm price tuple, denoted , such that , for any price by of the game. solution being a convex, in particular, a Proof: (a) With each polyhedron, the Nash problem (7) is equivalent to its KKT optimality conditions, which, together with the complementarity conditions in (8), are given in (35) at the bottom of the page denote the multipliers of the mask (cf. Appendix A), where constraints and are the multipliers of the transmit power constraints. It follows from [32, Prop. 1.3.4] (see also (49) in Appendix A) that the mixed nonlinear complementary problem , where ’s above is just the KKT system of the ’s are the multipliers of the interference constraints and (4). The always admits a solution, since the set is convex and compact, and the function is continuous [32, Corollary 2.2.5]. be an equilibrium pair of [whose existence (b) Let is guaranteed by statement (a)]. Then, must be the unique NE of game , i.e., [the uniqueness follows from Theorem 3(b) and the P-property of ]. Hence, is a solution of the . Conversely, if is any solution of the , then must be an equilibrium of . (c) The first part of (c1) follows from the strong monotonicity of on (and thus also on ) [32, Th. 2.3.3(b)], as . The latter part of (c1) stated in Proposition 2(b) under follows readily from statement (b) and the uniqueness of the solution of the . Statement (c2) follows from the , the is monotone (the function fact that, under is co-coercive on and thus monotone, see Proposi-

3259

to have tion 8) and solvable, which is sufficient for the a convex solution set [32, Th. 2.3.5(a)]. As a consequence, the must have a unique least-norm solution. A graphical representation of the main results in Theorem 9 as well as the relationships among the various games and the associated VI reformulations is given in Fig. 2. Remark 3 (On the Uniqueness of the Equilibrium Solution): Observe that the uniqueness of the solution of the as stated in Theorem 9(c1) implies only the uniqueness of of the secondary users at the NE the power allocation of , but not of the price tuple . The interesting result is —the solutions of that, in such a case, all these prices —yield equilibrium pairs the of game having the same optimal power allocation , . Nevertheless, part (c2) identifies i.e., a special price tuple that motivates a distributed algorithm for whose convergence can be established solving the game (see Section IV-B). under Remark 4 (On the Uniqueness Conditions): Sufficient conditions for matrix being a P-matrix (or a positive definite matrix) are given in Corollary 4. We thus refer to this corollary and to Remark 2 for a discussion on the physical interpretation of these conditions. Note that conditions given in Theorem 9 guar(and anteeing the uniqueness of the solution of the thus the uniqueness of the optimal power allocation of game ) are stronger that those required by Theorem 3 for the uniqueness (and thus the NE of game , for any of the solution of given ). This is due to the fact that the uniform P-property of the mapping on (Proposition 2) does not directly , yield the desired uniqueness result of the solution of because the set is not a Cartesian product as instead . For a set with no Cartesian product structure, a stronger condition on is required for the associated VI having a unique solution; which is indeed the strong monotonicity property [32, Th. 2.3.3]. However, milder conditions guaranteeing the uniqueness than those given in Theorem of the solution of the 9(c1) can be obtained by imposing the strong monotonicity of on rather than on (we omit the details because of the space limitation).

(35)

Authorized licensed use limited to: University of Illinois. Downloaded on May 18,2010 at 22:04:08 UTC from IEEE Xplore. Restrictions apply.

3260

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 58, NO. 6, JUNE 2010

Fig. 2. Graphical representation of the main results stated in Theorem 9.

Remark 5 (On the NCP Reformulation of the Game): Theorem 9 postulates the equivalence of the game with the [Theorem 9(a)] as well as with the [Theorem 9(b)–(c)]. The reformulation as a VI allows the characterization of the existence and uniqueness of the solution. However, it leads to algorithms that, in principle, require some coordination among the secondary users, since the interference constraints impose a coupling among strategies of the is not a of the secondary users (the set Cartesian product). The NCP formulation precisely solves this limitation and offers the possibility of devising iterative algorithms that can be implemented in a distributed fashion among all players and whose convergence can be studied using known results from the theory of VIs (cf. [32, Chapter 12]). In the following, we thus focus on this NCP equivalence to devise distributed algorithms for computing the solutions of game . B. Distributed Algorithms In this section, we propose several iterative algorithms, along with their convergence properties, for computing an equilibrium solution of game . The proposed algorithms differ in: i) the signaling required between primary and secondary users; ii) the computational effort; iii) the convergence speed; and iv) the convergence analysis. A formal description of the proposed algorithms is given next. formulation of the game Algorithm 2: Based on the [cf. Theorem 9(b)–(c)], the algorithm is just the Projection Algorithm with variable steps [32, Alg. 12.1.4] and is formally described in Algorithm 2, where the waterfilling mapping is defined in (25), with given in (11), and is defined in (29).

Algorithm 2: Projection algorithm with variable steps ; set . Data: Choose any Step 1 : If satisfies a suitable termination criterion: STOP , compute as the unique NE of Step 2 : Given (e.g., via Algorithm 1)

(36) Step 3 : Choose according to

and update the price vectors

(37) Step 4 : Set

; go to Step 1.

The algorithm has the following interpretation.3 In the main loop, at the th iteration, each primary user measures the received interference generated by the secondary users and, locally and independently from the other primary users, adjusts via the simple projection scheme in his own set of prices (37) [i.e., the update in (37) is implemented in a decentralized to fashion]. The primary users broadcast their own prices the secondary users, who then play the game defined in (10) corresponding to the price tuple , based on Algorithm 1 (sequential, simultaneous, or asynchronous). The convergence 3Through this section we tacitly assume that some interaction between the primary and the secondary users in the CR system is allowed (as, e.g., in the property-right CR model [5]), so that the updates of the prices can be performed by the primary users. A detailed discussion on the implementation of the proposed algorithms within the context of other CR debate models is given in Section IV-C.

Authorized licensed use limited to: University of Illinois. Downloaded on May 18,2010 at 22:04:08 UTC from IEEE Xplore. Restrictions apply.

PANG et al.: CR SYSTEMS UNDER TEMPERATURE-INTERFERENCE CONSTRAINTS

result of Algorithm 2 is given in the following theorem, whose proof follows from Proposition 8 and [32, Th. 12.1.8].4 Theorem 10: Suppose . If the scalars are chosen so that , where is defined in (32), then the sequence generated by Algorithm 2 converges to a solution of the . Algorithm 3: In this algorithm, we modify the outer loop of Algorithm 2 [i.e., the rule for updating the price tuple in the that Step 3] to avoid the choice of the step-size sequence depends on the co-coercive modulus of as instead in Algorithm 2 (cf. Theorem 10). The proposed modification is an adaptation of the Hyperplane Projection Algorithm presented in [32, Alg. 12.1.12], which adds an Armijo-type step-size selection that requires shared information among the primary users. The main loop of Algorithm 3 is formally described in the folis a given constant. lowing, where Algorithm 3: Hyperplane Projection Algorithm The steps of the algorithm are the same as those of Algorithm 2 except for Step 3, which is modified as follows. Let and be given. Step 3a : Compute (38) , Step 3b : Compute with being the smallest nonnegative integer (which must be finite) such that, with ,

3261

is stated in the following theorem, whose proof follows from Proposition 8 and [32, Th. 12.1.16].5 . Then the sequence Theorem 11: Suppose generated by Algorithm 3 converges to a solution of the . Algorithm 4: With respect to Algorithm 2, this algorithm has the added benefits of obtaining the (unique) least-norm solution , as stipulated in Theorem 9(c) (recall that the of the optimal might not be unique; see Remark 13). To this end, the price tuple is updated by successively solving a sequence of nonlinear complementarity subproblems defined by the perturbed (Tikhonov regularization), for a sequence of demap , where denotes the identity map (i.e., creasing scalars ). For each of these subproblems, we employ a simple Constant-step Projection Method [32, Alg. 12.1.1], whose con, by the strong monotonicity vergence is ensured, under of the map [32, Th. 12.1.2]. The formal description of the main loop of Algorithm 4 is given in the following and convergence stated in Theorem 12. Algorithm 4: Tikhonov regularization Algorithm The steps of the algorithm are the same as those of Algorithm 2 except for Step 3, which is modified as follows. Let , and be given. Step 3 : Compute the unique solution of the as the limit point of the sequence generated by the subiteration: given

,

, let

(41) (39) Step 3c : Update the price tuple

Theorem 12: Suppose is such that

The additional computational complexity in the above main loop with respect to the main loop of Algorithm 2 is in the repeated evaluation of the function corresponding to a (finite) sequence of decreasing step-sizes . When implemented by the primary users, this requires a signaling among them (if there is more than one primary user in the system). Moreover, for each evaluation from the primary users of at a given , the secondary users are required to play with . The convergence of Algorithm 3 the game

defined in (33), then the sequence generated by the subiteration in Algorithm 4 converges to the unique solution of the . Moreover, the sequence converges to the least-norm solution of the as . Proof: See Appendix E. A variation (inexact version) of the proposed algorithm can also be considered, in which each is not required to be ; i.e., the subiterations an exact solution of the (41) can be terminated according to a prescribed criterion that progressively becomes tighter as the iteration in proceeds. We omit the details and refer the interested reader to [45]. Algorithm 5: As opposed to the previous algorithms based on two nested loops, in this algorithm, there is only a major loop in which the secondary and the primary users update their decisions at the same level either sequentially or simultaneously

4For the reader convenience, we recall that, according to [32, Th. 12.1.8], the projection algorithm with variable steps [32, Alg. 12.1.4] converges to a solution 8) [whose existence is guaranteed by Theorem 9(b), under the of the NCP(8 P-property of 7 ] if the function 8 is co-coercive on with constant 8), and 0 < inf  sup  < 2c (88). Invoking Proposition 8, c (8 Theorem 10 follows readily.

5For the reader convenience, we recall that, according to [32, Th. 12.1.16], the convergence of the Hyperplane Projection Algorithm [32, Alg. 12.1.12] (Algo8) is guaranteed if the function 8 is conrithm 3) to a solution of the NCP(8 (weaker conditions on 8 are required in tinuous and monotone on [32, Th. 12.1.16]). Under the assumption 7 0, the mapping 8 satisfies these conditions (cf. Proposition 8).

(40)



. If each step-size , where



Authorized licensed use limited to: University of Illinois. Downloaded on May 18,2010 at 22:04:08 UTC from IEEE Xplore. Restrictions apply.

in (41) is

3262

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 58, NO. 6, JUNE 2010

(in the version described in Algorithm 5, the update is simultaneous). Thus, in Algorithm 5, the primary users adjust their prices as soon as the secondary users complete one iteration of their non-equilibrium allocation updates, rather than waiting for a full equilibrium response, as in Algorithm 2. The formal description of the algorithm is given in Algorithm 5. Interestingly, in Algorithm 5, the primary users can be interpreted as an extra player of an augmented game (equivalent to the original game ), who solves a trivial nonnegatively constraint linear program in the variable , parametrized by and based on the proximal regularization (alternative regularization schemes are possible, such as the well-known Tikhonov regularth iteration, given ization [32]): At the beginning of the , and , is the unique minimizer of the convex quadratic program:

(42) whose solution has the explicit expression given in (44). Algorithm 5: Proximal regularization algorithm Data: Choose any , for all , ; set . and Step 1 : If satisfies a suitable termination criterion: STOP , sequentially for , compute Step 2 : Given as

(43) Step 3 : Update the price vectors : for all , compute

, and

(44) Step 4 : Set

; go to Step 1.

While being closest in spirit to the IWFA algorithms described in Section III-C, the convergence analysis of Algorithm 5 is in jeopardy due to two causes: (i) the coupling of the secondary users’ variables due to the interference constraints,

and (ii) the relaxed control of pricing mechanism that imposes too little restriction on the price tuple. Up to date, a proof of convergence of Algorithm 5 is missing. In Section V, we provide some numerical results supporting the convergence of the algorithm in practical CR scenarios. C. Practical Implementation of the Proposed Algorithms In the proposed algorithms there are two levels of updates: 1) the computation of the optimal power allocations of the ; and 2) the updates secondary users, given the prices and , given the interference (the power of the prices allocation) generated by the secondary users. The former can be performed directly by the secondary users using some of the algorithms (either synchronous or asynchronous) proposed are given, these in Section III-C. Note that, once algorithms are totally distributed, since the secondary users only need to measure the received MUI over the subcarriers to perform the waterfilling solution in (25). The update of the and , once the interference generated by the prices secondary users at the receivers of the primary users is given, can be performed in different forms, according to Algorithms 2–5. Depending on the debate position assumed for the CR network—the property-right model or the common model—this update can be performed by the primary users (as assumed so far) or by the secondary users themselves, which leads to a different computational complexity and amount of signaling between the primary and the secondary users, as described next. Property-Right CR Model: In a CR network based on the property-right model (also termed as spectrum leasing model), an interaction between the primary and the secondary users is allowed. It is thus natural that the update of the prices is performed by the primary users. In such a case, in all the proposed algorithms, the signaling from the secondary users to the primary users is implicit, since the primary users to update the prices only need to locally measure the global received interference. The signaling from the primary to the secondary users, however, is explicit: the primary users have to broadcast the prices and and the secondary users receive and estimate their values. Note that, if the transmission of the prices is performed by the primary receivers and the reception by the secondary transmitters, then there is no need from the secondary users to estimate separately the cross-channel transfer functions and the prices, since the secondary users receive directly what they really need to compute the waterfilling solu. tion (25), which are the terms Regarding the computational complexity of the price update process, Algorithms 2–4 require inner iterations among the secondary users responding to the primary users’ announced price directives, whereas Algorithm 5 is composed by only one major loop in which the secondary and primary users update their decisions at the same level, either sequentially or simultaneously. More specifically, to update the prices, Algorithm 2 employs a gradient projection methods with arbitrarily chosen variable steps that are restricted to be less than the co-coercivity modulus of the function (see Theorem 10). By employing a proper variable step-size rule, Algorithm 3 bypasses this restriction, and thus, can be implemented without the knowledge of this

Authorized licensed use limited to: University of Illinois. Downloaded on May 18,2010 at 22:04:08 UTC from IEEE Xplore. Restrictions apply.

PANG et al.: CR SYSTEMS UNDER TEMPERATURE-INTERFERENCE CONSTRAINTS

constant. Nevertheless, additional computations are required in the main loop of the algorithm that involve shared information among the primary users. By employing a double iteration within each main loop among the primary users, Algorithm 4 offers a method to compute the least-norm price tuple of the game as stipulated by part Theorem 9(c), at the price of some signaling among the primary users. Of course, in Algorithms 3 and 4 there is no extra signaling in the outer loop if there is only one primary users in the system. Finally, being composed by only one major loop, Algorithm 5 has the advantage to be totally distributed and requires minimum interaction among the players. In some scenarios where the primary users cannot communicate with the secondary users (e.g., when the primary users are legacy systems) and the primary receivers have a fixed geographical location, it may be possible to install some monitoring devices close to each primary receiver having the functionality of interference measurement as well as price computation and broadcasting. CR Common Model: In a CR network based on the common model, the primary users are oblivious of the presence of the secondary users, thus behaving as if no secondary activity was and needs to present. In such a case, the update of be performed by the secondary users themselves. Nevertheless, at the price of additional (albeit reduced) signaling among the secondary users and computational complexity, Algorithms 2–5 can be still implemented in a distributed fashion by the secondary users. The only additional assumption we need is that each secondary user can estimate the cross-channel between his transmitter and transfer functions the receivers of the primary users and thus the interference generated at the receivers of the primary users over each subcarrier. The global interference generated by all the secondary users, which is what each secondary user really needs to update the prices, can be locally computed by each secondary users by running an average consensus algorithm [46], [47] that requires the interaction only between nearby secondary nodes. It is known that if the network of secondary users is connected, under mild assumptions on the consensus algorithm, every secondary users in a is able to get the average interference distributed and (possibly) asynchronous way [47]. Finally, observe that the (almost) distributed nature of the proposed algorithms comes at some price: since the Nash equilibria of the game are not in general Pareto efficient (even when there is a unique NE), the solutions achievable by the proposed algorithms might be Pareto dominated. A formal analysis of the performance loss due to the use of the Nash criterion with respect to the Pareto optimal solutions (the so-called price-of-anarchy) is up-to-date a formidable open problem to solve, and it goes beyond the scope of this paper. Recall however that solving the system-wide optimization is an NP-hard problem, even in the absence of interference constraints [8]. Furthermore, there are some practical CR scenarios where a (possibly suboptimal) system-wide optimization cannot be implemented, as secondary users are heterogeneous systems that are not willing to cooperate. Devising possibly distributed algorithms that converge to the globally optimal solutions of the system-wide optimization

3263

problem is up to date a formidable open problem that is worth to be investigated. This, however, goes beyond the scope of the paper. V. NUMERICAL RESULTS In this section, we provide some numerical results to illustrate our theoretical findings. More specifically, we compare the performance of the proposed game theoretical formulation via VI with the classical IWFA based on individual mask constraints, as studied in [20], [21], [23], and [24]. We also compare some of the proposed algorithms in terms of convergence speed. Conservative IWFA versus Flexible IWFA: We compare three different approaches, namely the VI-based formulation (Algorithms 2 and 5), the classical IWFA [17], [33], and the IWFA using spectral mask constraints [20], [21], [23], [24], in terms of interference generated at the primary user receivers and the achievable sum-rate from the secondary users; we refer to these algorithms as flexible IWFA, classical IWFA and conservative IWFA, respectively. As an example, we consider a CR system composed of 6 secondary links randomly distributed within an hexagonal cell and one primary user (the BS at the center of the cell). The primary user imposes a constraint on the maximum interference that can tolerate. For simplicity in our description, we assume that the primary user imposes a constant interference threshold over the whole spectrum, namely: (strong interference constraint) and (weak in[see (4)]. The inditerference constraint) for all vidual spectral mask constraints used in the conservative IWFA are chosen so that all the secondary users generate the same interference level at the primary receiver and the aggregate interference satisfies the imposed interference threshold. In Fig. 3 we plot the PSD of the interference generated by the secondary users at the receiver of the primary user, obtained, for a given channel realization, using the flexible IWFA (based on Algorithm 2 with constant step-size) and the conservative IWFA, under two different interference constraints. As benchmark, we also include the PSD of the interference generated by the classical IWFA [17], [33]. We clearly see from the picture that while classical IWFA violates the interference constraints, both conservative and flexible IWFAs satisfy them, but the global interference constraints impose less stringent conditions on the transmit power of the secondary users than those imposed by the individual interference constraints based on the spectral masks. However, this comes at the price of some signaling from the primary to the secondary users. Note also that, in the case of weak interference constraints, the flexible IWFA and the classical IWFA generate almost the same interference profile over the subcarriers where the interference constraint is strictly satisfied [since the complementarity condition (8), the prices over those subcarriers are zero]. Thanks to less stringent constraints on the transmit powers of the secondary users, the flexible IWFA is expected to exhibit a much better performance than the conservative IWFA also in terms of rates achievable by the secondary user. Fig. 4 confirms this intuition, where we plot the average sum-rate of the secondary users achievable by the conservative IWFA and the flexible IWFA as a function of the maximum tolerable interference

Authorized licensed use limited to: University of Illinois. Downloaded on May 18,2010 at 22:04:08 UTC from IEEE Xplore. Restrictions apply.

3264

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 58, NO. 6, JUNE 2010

Fig. 3. Comparison of IWFA algorithms: classical IWFA, conservative IWFA, and flexible IWFA, under strong and weak interference constraints; PSD of the interference profile at the primary user’s receiver.

we plot the rate evolution of the secondary users’ links corresponding to the two cited algorithms as a function of the iteration index. To make the figure not excessively overcrowded, we plot only the curves of 3 out of 15 links. As expected, the sequential IWFA is slower than the simultaneous IWFA, especially if the number of active links is large, since each user is forced to wait for all the users scheduled in advance, before updating his own power allocation. The same qualitative behavior has been observed for different channel realizations and value of prices. The fast convergence behavior of the IWFAs in the inner loop provides an intuitive explanation of why Algorithms 2 and 5 have been experienced to have almost the same convergence speed [Fig. 5(a)], provided that the step-size is properly chosen: After the first round of the IWFA in the inner loop, the secondary users are expected to be quite close the NE of already. Fig. 4. Comparison of IWFA algorithms: classical IWFA, conservative IWFA, and flexible IWFA: Achievable sum-rate versus the interference constraint.

at the primary receiver, within the same setup of Fig. 3. The curves are averaged over 500 random i.i.d. Gaussian channel realizations. Convergence Speed: In Fig. 5(a) we plot the worst-case violation of the interference constraint achieved by Algorithms 2 and 5 versus the number of iterations of the outer loop, for a CR system as in Fig. 3, composed now of 15 active secondary links. Interestingly, for the example considered in the figure, both Algorithms 2 and 5 experience the same convergence behavior (provided that the step-size is properly chosen) and converge reasonably fast. Thus, in such a scenario, Algorithm 5 is preferred to Algorithm 2, since it requires less iterations among the secondary users. Finally, in Fig. 5(b), we compare the performance in terms of convergence speed of the sequential and simultaneous IWFA with pricing (see Algorithm 1) used to comin the inner loop of Algorithm 2, pute the NE of game for a given price tuple and channel realization. In the figure,

VI. CONCLUSION In this paper, we have proposed a novel NE problem based on VI to solve one of the challenging and unsolved resource allocation problems in CR systems: How to allow in a decentralized way concurrent communication over frequency-selective channels among secondary users, under constraints imposed to the secondary users on the maximum per-carrier and global MUI tolerable at the primary receivers. We have seen how VI theory provides the natural framework to solve the proposed NE problem, namely: 1) the establishment of conditions guaranteeing the uniqueness of the equilibrium solution; and 2) the design of fairly decentralized algorithms able to reach the equilibrium points, with minimal coordination among the nodes. The proposed algorithms differ in the tradeoff between performance (in terms of information rate) achievable by the secondary users and the degree of information to be exchanged between the primary and the secondary users, and they have been shown to outperform the classical algorithms based on IWFA with spectral mask constraints (at the price of some signaling, albeit very reduced, from the primary to the secondary users).

Authorized licensed use limited to: University of Illinois. Downloaded on May 18,2010 at 22:04:08 UTC from IEEE Xplore. Restrictions apply.

PANG et al.: CR SYSTEMS UNDER TEMPERATURE-INTERFERENCE CONSTRAINTS

3265

Fig. 5. Example of convergence speed. (a) Worst-case violation of the interference constraints achieved by Algorithms 2 and 5 (flexible IWFA). (b) Secondary users’ rates versus the iteration index achieved in the inner loop of Algorithm 2 by Algorithm 1 (the sequential IWFA with pricing and the simultaneous IWFA with pricing).

APPENDIX A BACKGROUND ON VARIATIONAL INEQUALITY PROBLEMS Definition of the VI Problem: Given a subset of the Euand a mapping , clidean -dimensional space the VI problem, denoted , is to find a vector (called a solution of the VI) such that [32, Def. 1.1.1] (45) . The set of solutions to this problem is denoted Several standard problems in nonlinear programming, game theory, and nonlinear analysis can be naturally formulated as a VI problem, and some examples follow (see [32] for more source problems). – Solution of systems of equations. The simplest example of VI is the problem of solving a system of equations. In fact, it , then is equivalent to is easy to see that if such that . As special case, if the finding a mapping is affine, i.e., , the previous problem . is equivalent to the classical system of equation – Fixed-point problems. Given a closed and convex set and , the fixed-point problem is to find a a mapping vector such that . This problem can be converted into a VI format, simply by defining . – Constrained and unconstrained optimization. If is convex and the mapping in is the gradient of a real-valued , then represents a necessary function conditions of optimality for the following optimization problem: such that , for all . find a point Also, if the function is convex, the reverse assertion is true, minimizes over if and only if meaning that a point , where denotes the gradient of is a solution to (the VI coincides with the first-order necessary and sufficient

optimality conditions of a convex differentiable function). In , we see that unconstrained convex particular, if we let optimization is also a VI problem. – Game theory problems. Consider a strategic noncooperative , where player ’s problem is game of the other to determine, for each fixed but arbitrary tuple that solve the players’ strategies, an optimal strategy profile following optimization problem (in the minimization form) in the variable : minimize subject to

(46)

is convex and closed, and Suppose that each is convex and continuously differentiable in . By convexity and the first-order optimality conditions, is a NE if and only if we infer that a strategy profile , for each , where denotes the gradient of with respect to . Summing these conditions and taking into account the Cartesian product structure of the strategy set of the game, it is not difficult , to see that this set of inequalities is equivalent to the and [32, with Prop. 1.4.2]. Note that the game in (7), (8) is not a classical NEP as defined in (46) and thus cannot be readily cast in the VI problem as did above. Nevertheless, we can still gain from the VI framework to analyze the proposed game, as detailed in Section IV. – Complementarity problems. When the set is a cone (i.e., for all scalars ), the VI admits an equivalent form known as a complementarity problem, denoted , which is to find a vector such that [32, Def. by 1.1.2]

Authorized licensed use limited to: University of Illinois. Downloaded on May 18,2010 at 22:04:08 UTC from IEEE Xplore. Restrictions apply.

(47)

3266

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 58, NO. 6, JUNE 2010

where

is the dual cone of , defined as . In this paper we are interested in a special class of CPs, when is the nonnegative orthant of . In such a case the is known as nonlinear comple. Recognizing mentarity problem (NCP) and denoted that the dual cone of the nonnegative orthant is the nonnegative is to find a vector such that [32, orthant itself, the Def. 1.1.5] (48)

To cast the games proposed in this paper in the VI framework we will build on the Karush-Kuhn-Tucker (KKT) conditions to the VI, which are defined next. KKT System to the VI: Let be represented by finitely many differentiable inequalities and equations, i.e., , with and being vector-valued continuously differentiable functions. The following two statements are valid [32, Prop. 1.3.4]. . Under mild conditions on the con(a) Let and such that straints,6 there exist vectors

is the book [44]. A comprehensive and more advanced treatment can be found in the monograph [32]. In Section IV-B, we specialize some of these algorithms to solve the proposed equilibrium problem. APPENDIX B PROOF OF PROPOSITION 2 and (a) Given of convenience, define for each

in , for the sake , and

(50) and

(51) Note that (49) (b) Conversely, if each function is affine and each function is convex, and if satisfies (49), then . Existence and Uniqueness Results: The theory and solution methods for various kinds of VIs are developed rather well and allow one to choose a suitable way to investigate each particular problem under consideration. Here, we recall some of the basic conditions for the existence and uniqueness of the solution to a VI, as they are used in the paper. A classical existence is solvable if: i) is result reads as follows [32]. The a nonempty, convex, and compact subset of a finite-dimensional Euclidean space; and ii) is a continuous mapping [32, Corollary 2.2.5]. As far as the uniqueness of the solution, we mention the following condition used in our derivations in the paper: the is unique if is continuous and strongly solution to monotone (cf. Definition 1(a) in Section III) on the convex and closed set [32, Th. 2.3.3(b)] (the strong monotonicity of is sufficient also for the existence of a solution). Uniqueness has a Cartesian conditions can be weakened if the set , and : if structure, i.e., is closed and convex and is a continuous uniformly-P each function [cf. Definition 1(b)], then the has a unique solution [32, Prop. 3.5.10]. Several solution methods along with their convergence properties have been proposed for VI in the literature. A treatment on the subject goes beyond the scope of this paper and we refer the interest reader to the technical literature on the subject. A good entry point on parallel and distributed algorithms and their convergence for optimization problems and variational inequalities 6One of the most general of constraints qualifications (CQs) is Abadie’s CQ (see [32, Sec. 3.2] for more details). However, for the purposes of this paper, where the set is defined by only convex inequalities g (x) 0, with each g being a convex function, the Slater CQ is sufficient.

K



for . Also recall that , (from the normalization in (16)). Then, for each (52)

(53)

(54)

(55)

(56)

(57) where in (56) we used the Cauchy-Schwarz inequality. Since is a P-matrix from the assumption, it follows from the characterization [34, Th. 3.3.4(b)] of a P-matrix7 that the conis positive. stant In other words (58) 7An alternative characterization of a P-matrix with respect to that given in Definition 2 is the following: A matrix M is said to be a P-matrix if M reverses the sign of no nonzero vector, i.e., [x (M x) 0 for all q ] [x = 0] [34, Th. 3.3.4(b)].

2



Authorized licensed use limited to: University of Illinois. Downloaded on May 18,2010 at 22:04:08 UTC from IEEE Xplore. Restrictions apply.

)

PANG et al.: CR SYSTEMS UNDER TEMPERATURE-INTERFERENCE CONSTRAINTS

holds for an arbitrary vector (58), we get

. Now, combining (57) and

3267

Similarly, at the NE

of game

we have

(64)

(59) establishing the uniformly P-property of the function on (and ). (b) The proof of the strong monotonicity property of under the assumption that is positive definite follows similarly: given (57) and summing over we have

We focus now on the definition of a proper error iterates generated by the algorithm that, under the P-property of matrix , converges to zero, implying the global convergence of the algorithm to the unique NE of . It follows from the first-order optimality conditions of (61) that, ,

(65) Furthermore, it follows from the definition of NE that, (60)

APPENDIX C PROOF OF THEOREM 6

(66)

We prove next, using contraction arguments, that the segenerated by the sequential IWFA quence described in Algorithm 1 converges to the unique solution of , provided that the matrix is a P-matrix. the One can similarly show that the P-property of matrix is also sufficient for the convergence of the simultaneous implementation of the algorithm (we omit the details because of the space limitation). is a P-matrix and let denote by the Suppose that (recall from Theorem 3 that the P-propunique NE of game is sufficient for the uniqueness of the NE of ). erty of at iteration According to the sequential IWFA, given , at the beginning of iteration , the optimal transmission strategy computed sequentially by every user is the unique solution to the following maximization problem:

Adding (65) evaluated at , we obtain

and (66) evaluated at

(67)

Since

maximize

subject to with

and

(61) defined in (1) and (3), respectively. For the

sake of notation, we denote by the (normalized) multiuser interference-plus-noise PSD over the subcarrier , measured by user at the beginning of iteration , defined as (hereafter we omit the dependence of the power vector on ) (62)

(67) can be rewritten as shown in (68) at the bottom of the next page. Introducing

(63) (69) Authorized licensed use limited to: University of Illinois. Downloaded on May 18,2010 at 22:04:08 UTC from IEEE Xplore. Restrictions apply.

3268

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 58, NO. 6, JUNE 2010

let define, as in the proof of Proposition 2 (see Appendix B), the error quantity

and using the Introducing the error vector definition of Z-matrix as given in (20), which we can write as

(70)

(75)

. Recalling the scalar , we have the fol:

where , , and are, respectively, the diagonal, strictly lower triangular, and strictly upper triangular parts of , concatenating the inequality in (74) for all matrix , we obtain the following vector inequality (componentwise inequality):

for each

and

lowing lower and upper bounds for

(71) Using (70) and the Cauchy-Schwarz inequality, from (68) we deduce (72), shown at the bottom of the page. Hence, letting (73)

using (71), and dividing by obtain from (72)

(76) Since the Z-matrix is also a P-matrix (due to the fact that all its principal minors are equal to one), the inverse is well-defined and nonnegative entry-wise [34, Th. 3.11.10]. Hence, (76) is equivalent to

(assuming it is positive), we

(77) Moreover, using Lemma 1, the P-property of the spectral condition

(74)

[The last inequality is clearly valid if

.]

is equivalent to

implying that the sequence satisfying (77), and thus the sequence , converges to zero. This proves the global convergence of the sequential IWFA, under the P-property of matrix .

(68)

(72)

Authorized licensed use limited to: University of Illinois. Downloaded on May 18,2010 at 22:04:08 UTC from IEEE Xplore. Restrictions apply.

PANG et al.: CR SYSTEMS UNDER TEMPERATURE-INTERFERENCE CONSTRAINTS

3269

APPENDIX D PROOF OF PROPOSITION 8

APPENDIX E PROOF OF THEOREM 12

[recall that this implies that is a strongly Suppose with strong monotonicity modulus monotone function on , see Proposition 2]. For any given , let be the unique solution of the . Note that is related to the unique NE of game in (10)—the solution of the —by . Furthermore, is a co-coercive function of with modulus [32, Prop. 2.3.1], i.e.

The first statement of the theorem follows from [32, Th. 12.1.2]: The subiteration (41) is just the Basic Projection Algo, whose rithm [32, Alg. 12.1.1] applied to the global convergence to the unique solution of is ensured if the mapping is strongly monotone (with modulus ) and Lipschitz continuous (with Lipschitz constant ) and the step-size is such that [32, Th. 12.1.2]. It is not difficult to show that the co-coercivity of the (Proposition 8) implies the mapping with modulus with modulus and the strong monotonicity of ; which Lipschitz continuity with constant proves the claimed convergence of the subiteration (41). The proof of the second statement of the theorem is based on [32, Th. 12.2.3]: The unique least-norm solution of the (whose existence is guaranmonotone and solvable teed by the convexity of the nonempty solution set, implied by the monotonicity of [32, Th. 2.3.5]) is the limit point of the tends to zero. Tikhonov trajectory as the perturbation

(78) To establish the latter inequality, note that we have

(79) and

REFERENCES (80) Adding these two inequalities, rearranging terms, and using the strong monotonicity of , the desired co-coercivity property of follows readily. as in (11) and using , it Choosing follows from (78) that, for any two tuples

(81) Using the definition of mapping in (29), we deduce from (81) that the following inequalities hold:

(82) where is defined in (30), and calculated from the channels

is a positive constant, , such that

for all . The inequality in (82) proves the . desired co-coercivity property of

[1] FCC Spectrum Policy Task Force, Report of the Spectrum Efficiency Working Group Nov. 2002 [Online]. Available: http://www.fcc.gov/ sptf/files/SEWGFinalReport1.pdf [2] J. Mitola, “Cognitive radio for flexible mobile multimedia communication,” in Proc. IEEE Int. Workshop on Mobile Multimedia Commun. (MoMuC 1999), San Diego, CA, Nov. 15–17, 1999, pp. 3–10. [3] S. Haykin, “Cognitive radio: Brain-empowered wireless communications,” IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201–220, Feb. 2005. [4] Q. Zhao and B. Sadler, “A survey of dynamic spectrum access,” IEEE Commun. Mag., vol. 24, no. 3, pp. 79–89, May 2009. [5] A. Goldsmith, S. A. Jafar, I. Maric, and S. Srinivasa, “Breaking spectrum gridlock with cognitive radios: An information theoretic perspective,” Proc. IEEE, vol. 97, no. 5, pp. 894–914, May 2009. [6] D. P. Palomar and M. Chiang, “Alternative distributed algorithms for network utility maximization: Framework and applications,” IEEE Trans. Autom. Control, vol. 52, no. 12, pp. 2254–2269, Dec. 2007. [7] M. Chiang, C. W. Tan, D. P. Palomar, D. O. Neill, and D. Julian, “Power control by geometric programming,” IEEE Trans. Wireless Commun., vol. 6, no. 7, pp. 2640–2651, Jul. 2007. [8] Z.-Q. Luo and S. Zhang, “Spectrum management: Complexity and duality,” J. Sel. Topics Signal Process., vol. 2, no. 1, pp. 57–72, Feb. 2008. [9] R. Cendrillon, W. Yu, M. Moonen, J. Verliden, and T. Bostoen, “Optimal multi-user spectrum management for digital subscriber lines,” IEEE Trans. Commun., vol. 54, no. 5, pp. 922–933, May 2006. [10] W. Yu and R. Lui, “Dual methods for nonconvex spectrum optimization of multicarrier systems,” IEEE Trans. Commun., vol. 54, no. 7, pp. 1310–1322, Jul. 2006. [11] S. Hayashi and Z.-Q. Luo, “Spectrum management for interferencelimited multiuser communication systems,” IEEE Trans. Inf. Theory, vol. 55, no. 3, pp. 1153–1175, Mar. 2009. [12] A. Leshem and E. Zehavi, “Game theory and the frequency selective interference channel—A tutorial,” IEEE Signal Process. Mag. [Online]. Available: http://arxiv.org/abs/0903.2174, submitted for publication [13] Y. Xing, C. N. Mathur, M. Haleem, R. Chandramouli, and K. Subbalakshmi, “Dynamic spectrum access with QoS and interference temperature constraints,” IEEE Trans. Mobile Comput., vol. 6, no. 4, pp. 423–433, Apr. 2007. [14] Q. Lu, W. Wang, W. Wang, and T. Peng, “Asynchronous distributed power control under interference temperature constraints,” in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), New Orleans, LA, Nov. 30–Dec. 4 2008. [15] W. Wang, T. Peng, and W. Wang, “Optimal power control under interference temperature constraints in cognitive radio network,” in Proc. IEEE Wireless Commun. Netw. Conf. (WCNC 2007), Hong Kong, HK, Mar. 11–15, 2008.

Authorized licensed use limited to: University of Illinois. Downloaded on May 18,2010 at 22:04:08 UTC from IEEE Xplore. Restrictions apply.

3270

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 58, NO. 6, JUNE 2010

[16] M. J. Osborne and A. Rubinstein, A Course in Game Theory. Cambridge, MA: MIT Press, Jul. 2004. [17] W. Yu, G. Ginis, and J. M. Cioffi, “Distributed multiuser power control for digital subscriber lines,” IEEE J. Sel. Areas Commun., vol. 20, no. 5, pp. 1105–1115, June 2002. [18] G. Scutari, “Competition and cooperation in wireless communication networks,” Ph.D. dissertation, INFOCOM Dep., Univ. Rome “La Sapienza”, Rome, Italy, Nov. 2004. [19] N. Yamashita and Z.-Q. Luo, “A nonlinear complementarity approach to multiuser power control for digital subscriber lines,” Optim. Methods and Software, vol. 19, pp. 633–652, 2004. [20] R. Cendrillon, J. Huang, M. Chiang, and M. Moonen, “Autonomous spectrum balancing for digital subscriber lines,” IEEE Trans. Signal Process., vol. 55, no. 8, pp. 4241–4257, Aug. 2007. [21] Z.-Q. Luo and J.-S. Pang, “Analysis of iterative waterfilling algorithm for multiuser power control in digital subscriber lines,” EURASIP J. Appl. Signal Process., vol. 2006, pp. 1–10, May 2006. [22] G. Scutari, D. P. Palomar, and S. Barbarossa, “Optimal linear precoding strategies for wideband noncooperative systems based on game theory—Part I: Nash equilibria,” IEEE Trans. Signal Process., vol. 56, no. 3, pp. 1230–1249, Mar. 2008. [23] G. Scutari, D. P. Palomar, and S. Barbarossa, “Optimal linear precoding strategies for wideband noncooperative systems based on game theory—Part II: Algorithms,” IEEE Trans. Signal Process., vol. 56, no. 3, pp. 1250–1267, Mar. 2008. [24] G. Scutari, D. P. Palomar, and S. Barbarossa, “Asynchronous iterative water-filling for Gaussian frequency-selective interference channels,” IEEE Trans. Inf. Theory, vol. 54, no. 7, pp. 2868–2878, Jul. 2008. [25] J.-S. Pang, G. Scutari, F. Facchinei, and C. Wang, “Distributed power allocation with rate constraints in Gaussian parallel interference channels,” IEEE Trans. Inf. Theory, vol. 54, no. 8, pp. 3471–3489, Aug. 2008. [26] F. Wang, M. Krunz, and S. Cui, “Price-based spectrum management in cognitive radio networks,” IEEE J. Sel. Topics Signal Process., vol. 2, no. 1, pp. 74–87, Feb. 2008. [27] J. Huang, R. Berry, and M. L. Honig, “Distributed interference compensation for wireless networks,” IEEE J. Sel. Areas Commun., vol. 24, no. 5, pp. 1074–1084, May 2006. [28] O. Simeone, I. Stanojev, S. Savazzi, Y. Bar-Ness, U. Spagnolini, and R. Pickholtz, “Spectrum leasing to cooperating ad hoc secondary networks,” IEEE J. Sel. Areas Commun., vol. 26, no. 1, pp. 203–213, Jan. 2008. [29] M.-H. Lin, J.-F. Tsai, and Y. Ye, “Budget allocation in a competitive communication spectrum economy,” EURASIP J. Appl. Signal Process. 2009 [Online]. Available: http://www.stanford.edu/~yyye/spectrumbudget7_eurasip1.pdf, to be published [30] Z. Ji and K. Liu, “Dynamic spectrum sharing: A game theoretical overview,” IEEE Commun. Mag., vol. 45, no. 5, pp. 88–94, May 2007. [31] D. Niyato and E. Hossain, “Spectrum trading in cognitive radio networks: A market—Equilibrium—Based approach,” IEEE Wireless Commun., vol. 15, no. 6, pp. 71–80, Dec. 2008. [32] F. Facchinei and J.-S. Pang, Finite-Dimensional Variational Inequalities and Complementarity Problem. New York: Springer-Verlag, 2003. [33] R. Etkin, A. Parekh, and D. Tse, “Spectrum sharing for unlicensed bands,” IEEE J. Sel. Areas Commun., vol. 25, no. 3, pp. 517–528, Apr. 2007. [34] R. W. Cottle, J.-S. Pang, and R. E. Stone, The Linear Complementarity Problem. Cambridge, U.K.: Cambridge Academic , 1992. [35] T. M. Cover and J. A. Thomas, Elements of Information Theory. New York: Wiley, 1991. [36] Y. Noam and A. Leshem, “Iterative power pricing for distributed spectrum coordination in DSL,” IEEE Trans. Commun., vol. 57, no. 4, Apr. 2009. [37] F. Meshkati, V. Poor, and S. Schwartz, “Energy-efficient resource allocation in wireless networks,” IEEE Signal Process. Mag., vol. 24, no. 3, pp. 58–68, May 2007. [38] C. U. Saraydar, N. B. Mandayam, and D. J. Goodman, “Efficient power control via pricing in wireless data networks,” IEEE Trans. Commun., vol. 50, no. 2, pp. 291–303, Feb. 2002. [39] R. D. Yates, “A framework for uplink power control in cellular radio systems,” IEEE J. Sel. Areas Commun., vol. 52, no. 7, pp. 1341–1347, Sep. 1995. [40] C. W. Sung and K. K. Leung, “A generalized framework for distributed power control in wireless networks,” IEEE Trans. Inf. Theory, vol. 51, no. 7, pp. 2625–2635, Jul. 2005.

[41] A. Berman and R. J. Plemmons, Nonnegative Matrices in the Mathematical Sciences. Philadelphia, PA: Society for Industrial Mathematics (SIAM), 1987. [42] R. A. Horn and C. R. Johnson, Matrix Analysis. Cambridge , U.K.: Cambridge Univ. Press, 1985. [43] D. P. Palomar and J. Fonollosa, “Practical algorithms for a family of waterfilling solutions,” IEEE Trans. Signal Process., vol. 53, no. 2, pp. 686–695, Feb. 2005. [44] D. P. Bertsekas and J. N. Tsitsiklis, Parallel and Distributed Computation: Numerical Methods, 2nd ed. New York: Athena Scientific , 1989. [45] R. T. Rockafellar, “Monotone operators and the proximal point algorithm,” SIAM J. Control Optim. (SICON), vol. 14, no. 5, pp. 877–898, Aug. 1976. [46] R. Olfati-Saber, J. A. Fax, and R. M. Murray, “Consensus and cooperation in networked multi-agent systems,” Proc. IEEE, vol. 95, no. 1, pp. 215–223, Jan. 2007. [47] G. Scutari, S. Barbarossa, and L. Pescosolido, “Distributed decision through self-synchronizing sensor networks in the presence of propagation delays and asymmetric channels,” IEEE Trans. Signal Process., vol. 56, no. 4, pp. 1667–1684, Apr. 2008.

Jong-Shi Pang received the Ph.D. degree in operations research from Stanford University, Stanford, CA. He is the Caterpillar Professor and Head of the Department of Industrial and Enterprise Systems Engineering at the University of Illinois at Urbana-Champaign. Prior this position, he was the Margaret A. Darrin Distinguished Professor in Applied Mathematics at Rensselaer Polytechnic Institute, Troy, NY. He had taught at The Johns Hopkins University, Baltimore, MD, The University of Texas at Dallas, and Carnegie-Mellon University, Pittsburgh, PA. His research interests are in continuous optimization and equilibrium programming and their applications in engineering, economics, and finance. Among the current projects, he is studying various extensions of the basic Nash equilibrium problem, including the Stackelberg game and its multileader generalization, and the dynamic version of the Nash problem. The mathematical tool for the latter problem is a new class of dynamical systems known as differential variational inequalities, which provides a powerful framework for dealing with applications that involve dynamics, unilateral constraints, and disjunction. Dr. Pang has received several awards and honors, most notably the George B. Dantzig Prize in 2003 jointly awarded by the Mathematical Programming Society and the Society for Industrial and Applied Mathematics and the 1994 Lanchester Prize by the Institute for Operations Research and Management Science. He was recently selected as a member in the inaugural 2009 class of the SIAM Fellows. He is an ISI highly cited author in the mathematics category.

Gesualdo Scutari (S’05–M’06) received the Electrical Engineering and Ph.D. degrees (both with honors) from the University of Rome “La Sapienza,” Rome, Italy, in 2001 and 2004, respectively. During 2003, he held a visiting research appointment with the Department of Electrical Engineering and Computer Sciences, University of California at Berkeley; during 2007 and 2008, he was a Postdoctoral Fellow with the Department of Electronic and Computer Engineering, Hong Kong University of Science and Technology (HKUST); during 2009, he was a Research Associate with the Department of Electronic and Computer Engineering, HKUST and a Postdoctoral Researcher with the INFOCOM Department, University of Rome, “La Sapienza.” He is currently a Research Associate with the Department of Industrial and Enterprise Systems Engineering, University of Illinois at Urbana-Champaign. He has participated in two European projects on multiantenna systems and multihop systems (IST SATURN and IST-ROMANTIK). He is currently involved in the European project WINSOC, on wireless sensor networks, and in the European project SURFACE, on reconfigurable air interfaces for wideband multiantenna communication systems. His primary research interests include applications of convex optimization theory, game theory, and variational inequality theory to signal processing and communications; sensor networks; and distributed decisions. Dr. Scutari received the 2006 Best Student Paper Award at the International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2006.

Authorized licensed use limited to: University of Illinois. Downloaded on May 18,2010 at 22:04:08 UTC from IEEE Xplore. Restrictions apply.

PANG et al.: CR SYSTEMS UNDER TEMPERATURE-INTERFERENCE CONSTRAINTS

Daniel P. Palomar (S’99–M’03–SM’08) received the Electrical Engineering and Ph.D. degrees (both with honors) from the Technical University of Catalonia (UPC), Barcelona, Spain, in 1998 and 2003, respectively. Since 2006, he has been an Assistant Professor with the Department of Electronic and Computer Engineering, Hong Kong University of Science and Technology (HKUST). He has held several research appointments, namely, at King’s College London (KCL), London, U.K.; the Technical University of Catalonia (UPC), Barcelona, Spain; Stanford University, Stanford, CA; the Telecommunications Technological Center of Catalonia (CTTC), Barcelona; the Royal Institute of Technology (KTH), Stockholm, Sweden; the University of Rome “La Sapienza,” Rome, Italy; and Princeton University, Princeton, NJ. His current research interests include applications of convex optimization theory, game theory, and variational inequality theory to signal processing and communications. Dr. Palomar is an Associate Editor of the IEEE TRANSACTIONS ON SIGNAL PROCESSING, a Guest Editor of the IEEE Signal Processing Magazine 2010 Special Issue on Convex Optimization for Signal Processing, was a Guest Editor of the IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS 2008 Special

3271

Issue on Game Theory in Communication Systems, as well as the Lead Guest Editor of the IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS 2007 Special Issue on Optimization of MIMO Transceivers for Realistic Communication Networks. He serves on the IEEE Signal Processing Society Technical Committee on Signal Processing for Communications (SPCOM). He is a recipient of a 2004/2006 Fulbright Research Fellowship; the 2004 Young Author Best Paper Award by the IEEE Signal Processing Society; the 2002–2003 Best Ph.D. Prize in Information Technologies and Communications by UPC; the 2002–2003 Rosina Ribalta First Prize for the Best Doctoral Thesis in Information Technologies and Communications by the Epson Foundation; and the 2004 prize for the Best Doctoral Thesis in Advanced Mobile Communications by the Vodafone Foundation and COIT.

Francisco Facchinei received the Ph.D. degree in system engineering from the University of Rome, “La Sapienza,” Rome, Italy. He is full professor of Operations Research, Engineering Faculty, University of Rome, “La Sapienza.” His research interests focus on theoretical and algorithmic issues related to nonlinear optimization, variational inequalities, complementarity problems, equilibrium programming, and computational game theory.

Authorized licensed use limited to: University of Illinois. Downloaded on May 18,2010 at 22:04:08 UTC from IEEE Xplore. Restrictions apply.

Suggest Documents